Training is a minuscule investment, compared to potentially massive financial loss and irreparable damage to a company’s reputation. For training to be effective, it’s going to have to train security personnel how to think like a malicious hacker, in order to stop them.
The list of recently compromised companies just keeps growing, with names like Sony, Lockheed Martin, RSA Security, Citigroup, IMF, the Senate, and most recently, SEGA with 1.3 million users potentially being affected. There seems no end of the storm in sight. As technology evolves, there will be more features and complexity, which may lead to more vulnerabilities being exposed for perpetrators to exploit.
“If companies ever needed justification for investing more in advanced and technical security training, then the onslaught of attacks we’ve seen over the past couple of months are it,” said Jay Bavisi, president and co-founder of EC-Council, creator of the Department of Defense Directive 8570-approved Certified Ethical Hacker (CEH) program. “Today’s attackers are clever enough to launch sophisticated attacks, but if there’s a simple, common vulnerability to exploit, they’ll be on it. Security professionals must be able to match them, step for step, by staying abreast of all attack methodologies, from the everyday, routine attacks to the specific, complex attacks.”
For more information on this, please visit “http://www.prweb.com/releases/2011/6/prweb8589909.htm“.